Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: drones
Unmanned drones are vulnerable to computer hacking that could allow outside force to control them, according to new research.
After a decade of costly conflict in Iraq and Afghanistan, the American way of war is evolving toward less brawn, more guile.
Drone aircraft spy on and attack terrorists with no pilot in harm's way. Small teams of special operations troops quietly train and advise foreign forces. Viruses sent from computers to foreign networks strike silently, with no American fingerprint.
The White House is partially lifting the lid of secrecy on its counterterrorism campaign against al-Qaida in Yemen and Somalia by formally acknowledging for the first time that it is conducting lethal attacks in those countries.
Civilian cousins of the unmanned military aircraft that have tracked and killed terrorists in the Middle East and Asia are in demand by police departments, border patrols, power companies, news organizations and others wanting a bird's-eye view that's too impractical or dangerous for conventional planes or helicopters to get.
The new Predator-B Unmanned Aerial System will be the fourth launched at at the National Air Security Operations Center in Sierra Vista, Ariz., and the second of two aircrafts earmarked in an August 2010 budget supplemental.
Steven Gitlin, vice president of Aerovironment, which creates the backpackable drone — formally known as the Switchblade Agile Munition Systems — joined the Federal Drive with Tom Temin and Amy Morris to discuss how it works.
Recent report in The New York Times explains how.
The computer virus that hit the Pentagon's drone program last month was not directed at the military systems but was common malware used to steal log-ins and passwords used in online gaming, military officials said Wednesday.
So did US drones kill Usama Bin Laden's son Saad? Words like probably and likely are being used to address the question. Why? Intelligence sources close to the situation say when people are killed in missile strikes, the only way to identify them is to test the DNA at the scene. Problem is in some countries for a number of reasons. DNA testing is not allowed. So, without a body, there's no way to say for sure that he was killed or even there.